首页 > 最新文献

IET Information Security最新文献

英文 中文
Improvement of the Minimal-Guess-Basis MILP Model and Its Application to ESF 最小猜测基MILP模型的改进及其在ESF中的应用
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-06 DOI: 10.1049/ise2/9915144
Lingchen Li, Zhi Qiao, Yiming Dai, Yongzhuang Wei, Tao Ye

The guess-and-determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system. In the context of symmetric cryptography analysis, the guess-and-determine technique is employed to deduce partial subkey information to recover the master key. The set of variables that need to be guessed is called the guess basis.The crux of the guess-and-determine technique lies in identifying the minimal guess basis. By introducing new equal relations and initial constraints, this paper enhances the minimal guess basis mixed integer linear programming (MILP) model. The new model offers a more comprehensive depiction of key schedule, thereby enabling a more accurate and efficient derivation of the minimal guess basis.The novel model is applied to the eight-sided fortress (ESF) block cipher algorithm. By extending forward by three rounds and backward by three rounds based on a nine-round impossible differential distinguisher, a 15-round impossible differential attack is conducted. Utilizing the new model, the minimal guess basis required for key recovery is determined to be 54 bits. This represents a significant improvement compared to the existing result of 58 bits.The results indicate that for a 15-round impossible differential attack on the ESF algorithm, the data complexity is 231.18 CP, the time complexity involves 261.67 iterations of 15-round encryption, and the memory complexity is 266.18 bytes. Furthermore, this paper introduces, for the first time, a principle for designing key scheduling algorithms based on the guessing basis. This principle is applied to the ESF algorithm, where the minimal guess basis is employed to determine the positions of S-boxes and the parameters for cyclic shifts within the key scheduling algorithm. Without altering the consumption of software or hardware resources, a global optimal search is conducted among various key scheduling candidate approaches. By employing an equivalence class partitioning approach derived from 2108 instances of nine-round impossible differential distinguishers, the search space is reduced. Eventually, a selection process identifies a set of eight novel key schedule algorithms that achieve the maximum value of 77 bits for the minimal guess basis. These new key scheduling algorithms exhibit enhanced resistance against impossible differential attacks.

猜测-确定技术在给定关系系统中未知变量的恢复中有广泛的应用。这种技术背后的基本概念包括猜测某些未知变量,并根据关系系统推断剩余的变量。在对称密码分析的背景下,采用猜测-确定技术推断部分子密钥信息以恢复主密钥。需要猜测的变量集称为猜测基。猜测-确定技术的关键在于确定最小猜测基础。通过引入新的相等关系和初始约束,对最小猜测基混合整数线性规划模型进行了改进。新模型提供了更全面的关键进度描述,从而能够更准确和有效地推导最小猜测基础。将该模型应用于八面堡垒分组密码算法中。在9回合不可能差别区分法的基础上,向前延长3回合,向后延长3回合,进行15回合不可能差别攻击。利用新模型,密钥恢复所需的最小猜测基础被确定为54位。与现有的58位相比,这是一个显著的改进。结果表明:对ESF算法进行15轮不可能差分攻击时,数据复杂度为231.18 CP,时间复杂度为261.67次15轮加密迭代,内存复杂度为266.18字节。此外,本文还首次提出了一种基于猜测基的密钥调度算法设计原理。这一原理被应用到ESF算法中,其中使用最小猜测基来确定s -box的位置和密钥调度算法中循环移位的参数。在不改变软硬件资源消耗的前提下,对各种键调度候选方法进行全局最优搜索。通过采用2108个9轮不可能差分区分符的等价类划分方法,减少了搜索空间。最终,选择过程确定了一组8个新的密钥调度算法,这些算法在最小猜测基础上实现了77位的最大值。这些新的密钥调度算法增强了对不可能差分攻击的抵抗力。
{"title":"Improvement of the Minimal-Guess-Basis MILP Model and Its Application to ESF","authors":"Lingchen Li,&nbsp;Zhi Qiao,&nbsp;Yiming Dai,&nbsp;Yongzhuang Wei,&nbsp;Tao Ye","doi":"10.1049/ise2/9915144","DOIUrl":"https://doi.org/10.1049/ise2/9915144","url":null,"abstract":"<p>The guess-and-determine technique find wide applications in the recovery of unknown variables within given system of relations. The fundamental concept behind this technique involves guessing certain unknown variables and deducing the remaining ones based on the relational system. In the context of symmetric cryptography analysis, the guess-and-determine technique is employed to deduce partial subkey information to recover the master key. The set of variables that need to be guessed is called the guess basis.The crux of the guess-and-determine technique lies in identifying the minimal guess basis. By introducing new equal relations and initial constraints, this paper enhances the minimal guess basis mixed integer linear programming (MILP) model. The new model offers a more comprehensive depiction of key schedule, thereby enabling a more accurate and efficient derivation of the minimal guess basis.The novel model is applied to the eight-sided fortress (ESF) block cipher algorithm. By extending forward by three rounds and backward by three rounds based on a nine-round impossible differential distinguisher, a 15-round impossible differential attack is conducted. Utilizing the new model, the minimal guess basis required for key recovery is determined to be 54 bits. This represents a significant improvement compared to the existing result of 58 bits.The results indicate that for a 15-round impossible differential attack on the ESF algorithm, the data complexity is 2<sup>31.18</sup> CP, the time complexity involves 2<sup>61.67</sup> iterations of 15-round encryption, and the memory complexity is 2<sup>66.18</sup> bytes. Furthermore, this paper introduces, for the first time, a principle for designing key scheduling algorithms based on the guessing basis. This principle is applied to the ESF algorithm, where the minimal guess basis is employed to determine the positions of <i>S</i>-boxes and the parameters for cyclic shifts within the key scheduling algorithm. Without altering the consumption of software or hardware resources, a global optimal search is conducted among various key scheduling candidate approaches. By employing an equivalence class partitioning approach derived from 2108 instances of nine-round impossible differential distinguishers, the search space is reduced. Eventually, a selection process identifies a set of eight novel key schedule algorithms that achieve the maximum value of 77 bits for the minimal guess basis. These new key scheduling algorithms exhibit enhanced resistance against impossible differential attacks.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2026 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2026-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/9915144","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145983592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(Not Surprising) Attacks on Recent Pairing-Free Attribute-Based Encryption Schemes (不足为奇)最近对无配对属性加密方案的攻击
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-06 DOI: 10.1049/ise2/6991392
Javier Herranz

The fact that designing secure and efficient identity or attribute-based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in settings like the (pairing-free) discrete logarithm one. The goal of this submission is to emphasize, once again, the statements in the two previous paragraphs. As an illustration, we describe attacks on five insecure schemes that have recently been published in (prestigious) journals.

设计安全有效的身份或基于属性的加密(ABE)方案需要使用特定的代数工具,如双线性对或格,这在密码学社区中是众所周知的。然而,一些主要主题不是密码学的期刊仍然发表论文,例如,在(无配对)离散对数1等设置下提出ABE方案。本意见书的目的是再次强调前两段的陈述。作为说明,我们描述了最近在(著名的)期刊上发表的对五个不安全方案的攻击。
{"title":"(Not Surprising) Attacks on Recent Pairing-Free Attribute-Based Encryption Schemes","authors":"Javier Herranz","doi":"10.1049/ise2/6991392","DOIUrl":"https://doi.org/10.1049/ise2/6991392","url":null,"abstract":"<p>The fact that designing secure and efficient identity or attribute-based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in settings like the (pairing-free) discrete logarithm one. The goal of this submission is to emphasize, once again, the statements in the two previous paragraphs. As an illustration, we describe attacks on five insecure schemes that have recently been published in (prestigious) journals.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2026 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2026-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6991392","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks 重新审视轻量级流密码Draco的安全性:新的观察和TMDTO攻击
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-05 DOI: 10.1049/ise2/9996242
Ziyu Guan, Lin Ding, Zhengting Li, Xinhai Wang, Jie Guan

Draco is a lightweight small-state stream cipher proposed in 2022. It is designed to provide a 128-bit security level and be provably secure against time-memory-data trade-off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks. Based on a new observation that for certain chosen initialization vectors (IVs) the state update function of Draco depends on only a small fraction of the nonvolatile internal state, a new TMDTO attack on Draco with a time complexity of 2109.2 Draco iterations, a memory complexity of 2109.6 bits and a data complexity of 264 bits is proposed. The attack is 25 times better in the time/memory complexity with the same data complexity compared with the existing TMDTO attack. Furthermore, the security level that Draco can theoretically provide against TMDTO attacks is analyzed. As result, another TMDTO attack on Draco with complexities all below 287 is proposed. The cryptanalytic result shows that the Draco stream cipher can only offer an 87-bit security level against TMDTO attacks if the limitation on keystream length is not considered. Our results indicate that how to design a secure small-state stream cipher still needs further exploration.

Draco是2022年提出的轻量级小状态流密码。它被设计为提供128位安全级别,并且可以证明对时间-内存-数据权衡(TMDTO)攻击是安全的。在本文中,我们重新审视了Draco对TMDTO攻击的安全性。基于对选定的初始化向量(IVs)的状态更新功能仅依赖于一小部分非易失性内部状态的新观察,提出了一种新的针对Draco的TMDTO攻击,其时间复杂度为2109.2 Draco迭代,内存复杂度为2109.6 bits,数据复杂度为264 bits。与现有的TMDTO攻击相比,在相同的数据复杂度下,该攻击在时间/内存复杂度上提高了25倍。进一步分析了Draco在理论上能够提供的针对TMDTO攻击的安全级别。因此,提出了另一种复杂度低于287的TMDTO攻击天龙座。密码分析结果表明,在不考虑密钥流长度限制的情况下,Draco流密码对TMDTO攻击只能提供87位的安全级别。我们的研究结果表明,如何设计一个安全的小状态流密码还需要进一步的探索。
{"title":"Revisiting the Security of the Lightweight Stream Cipher Draco: New Observation and TMDTO Attacks","authors":"Ziyu Guan,&nbsp;Lin Ding,&nbsp;Zhengting Li,&nbsp;Xinhai Wang,&nbsp;Jie Guan","doi":"10.1049/ise2/9996242","DOIUrl":"https://doi.org/10.1049/ise2/9996242","url":null,"abstract":"<p>Draco is a lightweight small-state stream cipher proposed in 2022. It is designed to provide a 128-bit security level and be provably secure against time-memory-data trade-off (TMDTO) attacks. In this paper, we revisit the security of Draco against TMDTO attacks. Based on a new observation that for certain chosen initialization vectors (IVs) the state update function of Draco depends on only a small fraction of the nonvolatile internal state, a new TMDTO attack on Draco with a time complexity of 2<sup>109.2</sup> Draco iterations, a memory complexity of 2<sup>109.6</sup> bits and a data complexity of 2<sup>64</sup> bits is proposed. The attack is 2<sup>5</sup> times better in the time/memory complexity with the same data complexity compared with the existing TMDTO attack. Furthermore, the security level that Draco can theoretically provide against TMDTO attacks is analyzed. As result, another TMDTO attack on Draco with complexities all below 2<sup>87</sup> is proposed. The cryptanalytic result shows that the Draco stream cipher can only offer an 87-bit security level against TMDTO attacks if the limitation on keystream length is not considered. Our results indicate that how to design a secure small-state stream cipher still needs further exploration.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2026 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/9996242","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145909087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved FHE Bootstrapping and Its Applications in Discretized Neural Networks 改进的FHE自举及其在离散神经网络中的应用
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-23 DOI: 10.1049/ise2/7097351
Kaixing Wang, Binwu Xiang, Jiang Zhang, Yi Deng, Dengguo Feng

The inefficiency of bootstrapping is the primary bottleneck preventing fully homomorphic encryption (FHE) from practical applications. One of the main obstacles to improving the bootstrapping performance using hardware acceleration is the large storage overhead of the bootstrapping keys. To the best of our knowledge, a recent TFHE-like FHE scheme proposed by Xiang and colleagues in 2023 has the smallest bootstrapping key size, which is about 70 MB for 128-bit security parameter (including 60 MB for the key-switching keys and about 10 MB for the blind rotation keys). In this paper, we further improved the bootstrapping algorithm of Xiang et al. with a 30x reduction in key size and a 1.2x speedup. In particular, our new algorithm only requires less than 3 MB bootstrapping keys and can be completed in merely 3 ms at 128-bit security. Technically, we rearranged the main process of the TFHE-like bootstrapping algorithm which allows us to greatly reduce the size of the key-switching keys from previous to bits, where n is the dimension of the lattice. We also improved the computation of the automorphisms by using a single generator, which allows us to reduce the blind rotation key size from previous to bits, where q is the modulus of the ciphertext. Finally, we apply our new FHE scheme to discretized neural networks (DiNNs). Experimental results show that compared to a previous FHE-friendly DiNN approach by Bourse and colleagues in 2018 at the same security and accuracy, our approach achieves a 36x reduction in memory and a 8x speedup in time.

自引导的低效率是阻碍完全同态加密(FHE)实际应用的主要瓶颈。使用硬件加速提高引导性能的主要障碍之一是引导键的巨大存储开销。据我们所知,最近由Xiang及其同事在2023年提出的一种类似tfhe的FHE方案具有最小的启动密钥大小,128位安全参数约为70 MB(其中密钥交换密钥为60 MB,盲旋转密钥约为10 MB)。在本文中,我们进一步改进了Xiang等人的bootstrapping算法,将密钥大小减少了30倍,加速了1.2倍。特别是,我们的新算法只需要少于3mb的引导密钥,并且在128位安全性下只需3 ms即可完成。从技术上讲,我们重新安排了类似tfhes的自举算法的主要过程,这使我们能够大大减少密钥交换密钥的大小,其中n是晶格的维数。我们还通过使用单个生成器改进了自同构的计算,这使我们能够将盲旋转密钥大小从先前减少到位,其中q是密文的模。最后,我们将新的FHE方案应用于离散神经网络(dinn)。实验结果表明,与Bourse及其同事在2018年提出的具有相同安全性和准确性的fhe友好DiNN方法相比,我们的方法在内存上减少了36倍,在时间上加快了8倍。
{"title":"Improved FHE Bootstrapping and Its Applications in Discretized Neural Networks","authors":"Kaixing Wang,&nbsp;Binwu Xiang,&nbsp;Jiang Zhang,&nbsp;Yi Deng,&nbsp;Dengguo Feng","doi":"10.1049/ise2/7097351","DOIUrl":"https://doi.org/10.1049/ise2/7097351","url":null,"abstract":"<p>The inefficiency of bootstrapping is the primary bottleneck preventing fully homomorphic encryption (FHE) from practical applications. One of the main obstacles to improving the bootstrapping performance using hardware acceleration is the large storage overhead of the bootstrapping keys. To the best of our knowledge, a recent TFHE-like FHE scheme proposed by Xiang and colleagues in 2023 has the smallest bootstrapping key size, which is about 70 MB for 128-bit security parameter (including 60 MB for the key-switching keys and about 10 MB for the blind rotation keys). In this paper, we further improved the bootstrapping algorithm of Xiang et al. with a 30x reduction in key size and a 1.2x speedup. In particular, our new algorithm only requires less than 3 MB bootstrapping keys and can be completed in merely 3 ms at 128-bit security. Technically, we rearranged the main process of the TFHE-like bootstrapping algorithm which allows us to greatly reduce the size of the key-switching keys from previous <span></span><math></math> to <span></span><math></math> bits, where <i>n</i> is the dimension of the lattice. We also improved the computation of the automorphisms by using a single generator, which allows us to reduce the blind rotation key size from previous <span></span><math></math> to <span></span><math></math> bits, where <i>q</i> is the modulus of the ciphertext. Finally, we apply our new FHE scheme to discretized neural networks (DiNNs). Experimental results show that compared to a previous FHE-friendly DiNN approach by Bourse and colleagues in 2018 at the same security and accuracy, our approach achieves a 36x reduction in memory and a 8x speedup in time.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/7097351","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145887332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid CNN-LSTM Anomaly Detection in IoT Traffic Using the Hurst Self-Similarity Parameter Under Gaussian Noise 高斯噪声下基于Hurst自相似参数的物联网流量CNN-LSTM混合异常检测
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1049/ise2/6864273
Roya Morshedi, S. Mojtaba Matinkhah, Mohammad Taghi Sadeghi

The rapid growth of Internet of Things (IoT) devices has posed significant security challenges, particularly in detecting anomalies and malicious behaviors in network traffic. This study presents an innovative intrusion detection system (IDS) framework that combines Gaussian noise injection and Hurst parameter calculation with a hybrid convolutional neural network-long short-term memory (CNN-LSTM) model for anomaly detection in IoT traffic. The proposed approach is evaluated using the CIC-IDS2017 dataset, a comprehensive source representing network attacks. During the preprocessing stage, noise is added to simulate real-world network fluctuations, and Hurst parameter values are calculated to measure the long-term memory of traffic patterns. Principal component analysis (PCA) is also employed to reduce data dimensionality while preserving critical features, including the Hurst parameter. The CNN-LSTM model, optimized with the Adam optimizer, effectively learns the spatiotemporal features of network traffic and demonstrates high accuracy in classifying benign and attack samples. Experimental results reveal that the model achieves an accuracy and detection rate of 99.69%, even in the presence of noise. Incorporating the Hurst parameter as a distinguishing feature enhances the detection of subtle anomalies that traditional IDS methods may overlook. The anomaly detection mechanism analyzes traffic patterns using an error threshold and flags deviations as potential security threats. The proposed IDS framework effectively distinguishes between normal and malicious traffic, balancing the detection of both rare and common attacks. The findings underscore the importance of integrating statistical metrics, such as the Hurst parameter, with deep learning models to enhance the robustness and reliability of IoT security systems. This hybrid approach addresses the dynamic and evolving nature of IoT networks, offering a scalable and efficient solution for real-time anomaly detection. The proposed method marks a promising advancement in securing IoT ecosystems against evolving cyberthreats.

物联网(IoT)设备的快速增长带来了重大的安全挑战,特别是在检测网络流量中的异常和恶意行为方面。本研究提出了一种创新的入侵检测系统(IDS)框架,该框架将高斯噪声注入和Hurst参数计算与混合卷积神经网络-长短期记忆(CNN-LSTM)模型相结合,用于物联网流量的异常检测。使用CIC-IDS2017数据集(代表网络攻击的综合来源)对所提出的方法进行了评估。在预处理阶段,加入噪声来模拟真实的网络波动,并计算Hurst参数值来测量流量模式的长期记忆。主成分分析(PCA)也用于降低数据维数,同时保留关键特征,包括Hurst参数。采用Adam优化器优化的CNN-LSTM模型能够有效学习网络流量的时空特征,对良性样本和攻击样本的分类具有较高的准确率。实验结果表明,即使存在噪声,该模型的准确率和检测率也达到了99.69%。将Hurst参数作为一个显著特征,可以增强对传统IDS方法可能忽略的细微异常的检测。异常检测机制使用错误阈值分析流量模式,并将偏差标记为潜在的安全威胁。提出的IDS框架能够有效区分正常流量和恶意流量,平衡对罕见攻击和常见攻击的检测。研究结果强调了将Hurst参数等统计指标与深度学习模型相结合的重要性,以提高物联网安全系统的鲁棒性和可靠性。这种混合方法解决了物联网网络的动态和不断发展的本质,为实时异常检测提供了可扩展和高效的解决方案。所提出的方法标志着在保护物联网生态系统免受不断变化的网络威胁方面取得了有希望的进展。
{"title":"Hybrid CNN-LSTM Anomaly Detection in IoT Traffic Using the Hurst Self-Similarity Parameter Under Gaussian Noise","authors":"Roya Morshedi,&nbsp;S. Mojtaba Matinkhah,&nbsp;Mohammad Taghi Sadeghi","doi":"10.1049/ise2/6864273","DOIUrl":"10.1049/ise2/6864273","url":null,"abstract":"<p>The rapid growth of Internet of Things (IoT) devices has posed significant security challenges, particularly in detecting anomalies and malicious behaviors in network traffic. This study presents an innovative intrusion detection system (IDS) framework that combines Gaussian noise injection and Hurst parameter calculation with a hybrid convolutional neural network-long short-term memory (CNN-LSTM) model for anomaly detection in IoT traffic. The proposed approach is evaluated using the CIC-IDS2017 dataset, a comprehensive source representing network attacks. During the preprocessing stage, noise is added to simulate real-world network fluctuations, and Hurst parameter values are calculated to measure the long-term memory of traffic patterns. Principal component analysis (PCA) is also employed to reduce data dimensionality while preserving critical features, including the Hurst parameter. The CNN-LSTM model, optimized with the Adam optimizer, effectively learns the spatiotemporal features of network traffic and demonstrates high accuracy in classifying benign and attack samples. Experimental results reveal that the model achieves an accuracy and detection rate of 99.69%, even in the presence of noise. Incorporating the Hurst parameter as a distinguishing feature enhances the detection of subtle anomalies that traditional IDS methods may overlook. The anomaly detection mechanism analyzes traffic patterns using an error threshold and flags deviations as potential security threats. The proposed IDS framework effectively distinguishes between normal and malicious traffic, balancing the detection of both rare and common attacks. The findings underscore the importance of integrating statistical metrics, such as the Hurst parameter, with deep learning models to enhance the robustness and reliability of IoT security systems. This hybrid approach addresses the dynamic and evolving nature of IoT networks, offering a scalable and efficient solution for real-time anomaly detection. The proposed method marks a promising advancement in securing IoT ecosystems against evolving cyberthreats.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6864273","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145824804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV 基于MP-LWE问题的可链接环签名方案设计及其在车联网中的应用
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-22 DOI: 10.1049/ise2/6682936
Lansheng Han, Wei Liao, Peng Chen

Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle-product learning with errors (MP-LWE) problem and applies it to vehicular networks to resist quantum computer attacks. First, a new authentication scheme based on the MP-LWE problem is proposed. In addition, it is demonstrated to be compatible with the DualRing framework. Then, according to the transformation of DualRing, a new efficient ring signature scheme based on the MP-LWE problem is obtained. With anti-collision hash functions to assign a specific tag to each user, this ring signature scheme is converted into a secure LRS scheme. Subsequently, under the random oracle model, the unforgeability, anonymity, and linkability of the LRS scheme are shown. Furthermore, by integrating the scheme constructed in this article with blockchain technology and applying it to IoV scenarios, it effectively ensures the privacy of vehicle identities during communication and the reliability of messages and significantly improves communication efficiency. The signature length of the LRS scheme designed in the present study is 4–20 times shorter than that of similar schemes. Regarding time overhead, the total time overhead of our scheme can be reduced by 14.72%–40.38%.

保障车联网用户的信息安全与隐私,是获取用户信任、推动车联网应用的关键。本文基于带误差中间产品学习(MP-LWE)问题,设计了一种高效的可链接环签名(LRS)方案,并将其应用于车载网络中,以抵御量子计算机攻击。首先,提出了一种新的基于MP-LWE问题的认证方案。此外,它还被证明与DualRing框架兼容。然后,根据DualRing的变换,得到了一种新的基于MP-LWE问题的高效环签名方案。利用抗冲突哈希函数为每个用户分配特定的标签,将该环签名方案转化为安全的LRS方案。随后,在随机oracle模型下,证明了LRS方案的不可伪造性、匿名性和可链接性。此外,通过将本文构建的方案与区块链技术相结合并应用于车联网场景,有效地保证了通信过程中车辆身份的保密性和消息的可靠性,显著提高了通信效率。本研究设计的LRS方案的签名长度比同类方案短4-20倍。在时间开销方面,我们方案的总时间开销可以减少14.72%-40.38%。
{"title":"Design of Linkable Ring Signature Scheme Based on the MP-LWE Problem and Its Application in IoV","authors":"Lansheng Han,&nbsp;Wei Liao,&nbsp;Peng Chen","doi":"10.1049/ise2/6682936","DOIUrl":"10.1049/ise2/6682936","url":null,"abstract":"<p>Ensuring the information security and privacy of users in the Internet of Vehicles (IoV) is crucial for gaining user trust and promoting the application of vehicular networks. This article designs an efficient linkable ring signature (LRS) scheme on the basis of the middle-product learning with errors (MP-LWE) problem and applies it to vehicular networks to resist quantum computer attacks. First, a new authentication scheme based on the MP-LWE problem is proposed. In addition, it is demonstrated to be compatible with the DualRing framework. Then, according to the transformation of DualRing, a new efficient ring signature scheme based on the MP-LWE problem is obtained. With anti-collision hash functions to assign a specific tag to each user, this ring signature scheme is converted into a secure LRS scheme. Subsequently, under the random oracle model, the unforgeability, anonymity, and linkability of the LRS scheme are shown. Furthermore, by integrating the scheme constructed in this article with blockchain technology and applying it to IoV scenarios, it effectively ensures the privacy of vehicle identities during communication and the reliability of messages and significantly improves communication efficiency. The signature length of the LRS scheme designed in the present study is 4–20 times shorter than that of similar schemes. Regarding time overhead, the total time overhead of our scheme can be reduced by 14.72%–40.38%.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6682936","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145846085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PathFuzzer: Sensitive Information Flow Path-Guided Fuzzing for Intent Vulnerabilities in Android Applications PathFuzzer: Android应用程序意图漏洞的敏感信息流路径引导模糊测试
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-05 DOI: 10.1049/ise2/5001786
Zhanhui Yuan, Zhi Yang, Shuyuan Jin, Jinglei Tan, Hongqi Zhang

Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security. Fuzzing methods, as traditional Intent vulnerability detection methods, are guided by the edge coverage of the program-directed graph and do not focus on sensitive information, resulting in a lack of ability to discover vulnerabilities related to sensitive information, especially long-path vulnerabilities. This article proposes PathFuzzer, which is an intent-sensitive information flow path-guided fuzzing method designed to efficiently detect intent vulnerabilities in Android applications. It leverages intent-sensitive information flow paths to guide fuzzing by sending test cases along these paths and mutating test cases based on the parameter within the paths. Additionally, PathFuzzer utilizes unique long path encoding and key node identification technology to enable test cases to efficiently test along sensitive information flow paths, while monitoring the test status to form a feedback mechanism for long paths. The evaluation results show that PathFuzzer successfully detected 131 intent vulnerabilities across 500 popular applications from Google Play. Compared to traditional methods, PathFuzzer achieved a 92% average path coverage rate on sensitive paths while improving detection efficiency by an average of up to 64%. In summary, PathFuzzer provides an efficient, accurate, and comprehensive method for detecting Intent vulnerabilities.

意图漏洞构成了重大威胁,因为它们允许攻击者利用未经验证的意图消息,导致敏感数据泄露、特权升级或未经授权的操作,从而危及用户隐私和系统安全。模糊方法作为传统的意图漏洞检测方法,以程序向图的边缘覆盖为指导,不关注敏感信息,缺乏对敏感信息相关漏洞尤其是长路径漏洞的发现能力。本文提出了PathFuzzer,它是一种意图敏感的信息流路径引导模糊测试方法,旨在有效地检测Android应用程序中的意图漏洞。它利用意图敏感的信息流路径,通过沿着这些路径发送测试用例,并根据路径中的参数改变测试用例,来指导模糊测试。此外,PathFuzzer利用独特的长路径编码和关键节点识别技术,使测试用例能够沿着敏感的信息流路径高效地进行测试,同时监控测试状态,形成长路径反馈机制。评估结果显示,PathFuzzer在b谷歌Play的500个流行应用程序中成功检测到131个意图漏洞。与传统方法相比,PathFuzzer在敏感路径上实现了92%的平均路径覆盖率,同时将检测效率平均提高了64%。总之,PathFuzzer为检测意图漏洞提供了一种高效、准确、全面的方法。
{"title":"PathFuzzer: Sensitive Information Flow Path-Guided Fuzzing for Intent Vulnerabilities in Android Applications","authors":"Zhanhui Yuan,&nbsp;Zhi Yang,&nbsp;Shuyuan Jin,&nbsp;Jinglei Tan,&nbsp;Hongqi Zhang","doi":"10.1049/ise2/5001786","DOIUrl":"10.1049/ise2/5001786","url":null,"abstract":"<p>Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security. Fuzzing methods, as traditional Intent vulnerability detection methods, are guided by the edge coverage of the program-directed graph and do not focus on sensitive information, resulting in a lack of ability to discover vulnerabilities related to sensitive information, especially long-path vulnerabilities. This article proposes PathFuzzer, which is an intent-sensitive information flow path-guided fuzzing method designed to efficiently detect intent vulnerabilities in Android applications. It leverages intent-sensitive information flow paths to guide fuzzing by sending test cases along these paths and mutating test cases based on the parameter within the paths. Additionally, PathFuzzer utilizes unique long path encoding and key node identification technology to enable test cases to efficiently test along sensitive information flow paths, while monitoring the test status to form a feedback mechanism for long paths. The evaluation results show that PathFuzzer successfully detected 131 intent vulnerabilities across 500 popular applications from Google Play. Compared to traditional methods, PathFuzzer achieved a 92% average path coverage rate on sensitive paths while improving detection efficiency by an average of up to 64%. In summary, PathFuzzer provides an efficient, accurate, and comprehensive method for detecting Intent vulnerabilities.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/5001786","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145686440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Access Framework for IoT–Cloud Integration With Blockchain and Bi-GCN 基于区块链和Bi-GCN的物联网云集成安全访问框架
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-04 DOI: 10.1049/ise2/6512865
Kavitha M. S., Gayathri Devi K.

Digital advancements have made cloud computing and IoT essential for innovative environments such as healthcare and industry. Cloud platforms offer scalable compute and storage capabilities, whereas IoT devices generate real-time data. However, there are significant challenges faced while integrating the IoT with cloud to achieve robust, scalable, and secure access control. Traditional centralized models, such as static rule-based mechanisms and public key infrastructure (PKI), are prone to single points of failure and suffer from limited scalability and poor adaptability. To address these issues, this paper proposes a decentralized access control architecture that combines blockchain with a hybrid bidirectional graph convolutional network (Bi-GCN). The framework integrates ciphertext policy-attribute based encryption (CP-ABE) with trusted platform module (TPM)–based pseudonymous identities and the blockchain smart contracts for fine- and hardware-assisted access control. A generative adversarial network (GAN)-assisted prevalidation layer filters sybil, tampering, and spoofing attempts before block inclusion, enhancing integrity and reducing overhead. Bi-GCN supports real-time anomaly detection, trust adaptation, and behavior profiling, while smart contracts enforce adaptive role-attribute policies. Experimental results show that the proposed model outperforms existing methods across key metrics, including 0.97 accuracy, 0.98 F-measure, and minimal security overhead of 0.7%. Although it introduces slight latency due to advanced processing, the benefits of secure and intelligent access management outweigh the trade-off. The integration of blockchain ensures decentralized and immutable policy enforcement, while Bi-GCN facilitates self-adaptive security, making the architecture suitable for dynamic IoT–cloud ecosystems.

数字技术的进步使得云计算和物联网对于医疗保健和工业等创新环境至关重要。云平台提供可扩展的计算和存储功能,而物联网设备生成实时数据。然而,在将物联网与云集成以实现强大、可扩展和安全的访问控制时,面临着重大挑战。传统的集中式模型,如静态基于规则的机制和公钥基础设施(PKI),容易出现单点故障,可扩展性有限,适应性差。为了解决这些问题,本文提出了一种将区块链与混合双向图卷积网络(Bi-GCN)相结合的分散访问控制体系结构。该框架将基于密文策略属性的加密(CP-ABE)与基于可信平台模块(TPM)的假名身份以及用于精细和硬件辅助访问控制的区块链智能合约集成在一起。生成对抗网络(GAN)辅助的预验证层在块包含之前过滤符号,篡改和欺骗尝试,增强完整性并减少开销。Bi-GCN支持实时异常检测、信任适应和行为分析,而智能合约执行自适应角色属性策略。实验结果表明,该模型在关键指标上优于现有方法,包括0.97的准确率、0.98的F-measure和最小的0.7%的安全开销。尽管由于高级处理,它引入了轻微的延迟,但安全和智能访问管理的好处大于代价。区块链的集成确保了分散和不可变的策略执行,而Bi-GCN促进了自适应安全性,使该架构适合动态物联网云生态系统。
{"title":"A Secure Access Framework for IoT–Cloud Integration With Blockchain and Bi-GCN","authors":"Kavitha M. S.,&nbsp;Gayathri Devi K.","doi":"10.1049/ise2/6512865","DOIUrl":"10.1049/ise2/6512865","url":null,"abstract":"<p>Digital advancements have made cloud computing and IoT essential for innovative environments such as healthcare and industry. Cloud platforms offer scalable compute and storage capabilities, whereas IoT devices generate real-time data. However, there are significant challenges faced while integrating the IoT with cloud to achieve robust, scalable, and secure access control. Traditional centralized models, such as static rule-based mechanisms and public key infrastructure (PKI), are prone to single points of failure and suffer from limited scalability and poor adaptability. To address these issues, this paper proposes a decentralized access control architecture that combines blockchain with a hybrid bidirectional graph convolutional network (Bi-GCN). The framework integrates ciphertext policy-attribute based encryption (CP-ABE) with trusted platform module (TPM)–based pseudonymous identities and the blockchain smart contracts for fine- and hardware-assisted access control. A generative adversarial network (GAN)-assisted prevalidation layer filters sybil, tampering, and spoofing attempts before block inclusion, enhancing integrity and reducing overhead. Bi-GCN supports real-time anomaly detection, trust adaptation, and behavior profiling, while smart contracts enforce adaptive role-attribute policies. Experimental results show that the proposed model outperforms existing methods across key metrics, including 0.97 accuracy, 0.98 <i>F</i>-measure, and minimal security overhead of 0.7%. Although it introduces slight latency due to advanced processing, the benefits of secure and intelligent access management outweigh the trade-off. The integration of blockchain ensures decentralized and immutable policy enforcement, while Bi-GCN facilitates self-adaptive security, making the architecture suitable for dynamic IoT–cloud ecosystems.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6512865","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145686117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AEDroid: Adaptive Enhanced Android Malware Detection-Based on Interpretability of Deep Learning AEDroid:基于深度学习可解释性的自适应增强Android恶意软件检测
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-24 DOI: 10.1049/ise2/5572223
Pengfei Liu, Guangquan Xu, Jian Sun, Wenxia Wang, Jie Chen

As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged. If we still rely on the original sensitive API set, malicious applications will not be discovered. To address this issue, we do not use the existing sensitive API feature set but instead design a key activation mechanism (KAM) based on convolutional neural networks (CNNs) to obtain sensitive API. We use this mechanism to automatically mine API features that play an important role in determining maliciousness from application datasets. And we use the API group (ApiG) obtained through this mechanism for template generalization, and obtain a method called AEDroid that can delay model aging. By analyzing these API features, it was found that they not only cover the existing sensitive API feature types but also include sensitive APIs for seven new types of malicious behavior. The experimental results show that with the addition of the newly discovered sensitive API, the Android malware detection rate has increased by more than 5%, especially on newly emerged malicious datasets, where the effect is more pronounced.

作为世界上使用最广泛的操作系统,Android自然成为了恶意黑客的主要攻击目标。目前Android恶意软件检测的研究依赖于手动定义的敏感API特性集。随着恶意行为的不断创新和变化,新的威胁和攻击方式不断涌现。如果我们仍然依赖原始的敏感API集,则不会发现恶意应用程序。为了解决这个问题,我们没有使用现有的敏感API特征集,而是设计了一种基于卷积神经网络(cnn)的密钥激活机制(KAM)来获取敏感API。我们使用这种机制来自动挖掘API特性,这些特性在从应用程序数据集中确定恶意方面起着重要作用。并利用该机制得到的API组(ApiG)进行模板泛化,得到一种可以延缓模型老化的AEDroid方法。通过对这些API特性的分析,发现它们不仅涵盖了现有的敏感API特性类型,还包含了针对7种新型恶意行为的敏感API。实验结果表明,随着新发现的敏感API的加入,Android恶意软件的检测率提高了5%以上,特别是对新出现的恶意数据集,效果更加明显。
{"title":"AEDroid: Adaptive Enhanced Android Malware Detection-Based on Interpretability of Deep Learning","authors":"Pengfei Liu,&nbsp;Guangquan Xu,&nbsp;Jian Sun,&nbsp;Wenxia Wang,&nbsp;Jie Chen","doi":"10.1049/ise2/5572223","DOIUrl":"https://doi.org/10.1049/ise2/5572223","url":null,"abstract":"<p>As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged. If we still rely on the original sensitive API set, malicious applications will not be discovered. To address this issue, we do not use the existing sensitive API feature set but instead design a key activation mechanism (KAM) based on convolutional neural networks (CNNs) to obtain sensitive API. We use this mechanism to automatically mine API features that play an important role in determining maliciousness from application datasets. And we use the API group (ApiG) obtained through this mechanism for template generalization, and obtain a method called AEDroid that can delay model aging. By analyzing these API features, it was found that they not only cover the existing sensitive API feature types but also include sensitive APIs for seven new types of malicious behavior. The experimental results show that with the addition of the newly discovered sensitive API, the Android malware detection rate has increased by more than 5%, especially on newly emerged malicious datasets, where the effect is more pronounced.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/5572223","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145626146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing Efficient Identity-Based Signatures on Lattices 构造基于格的高效身份签名
IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-19 DOI: 10.1049/ise2/6684889
Huiwen Jia, Ying Liu, Chunming Tang, Lin Wang

In this work, we explore the recent developments related to lattice-based signature and preimage sampling, and specify a compact identity-based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher security. Then, by adapting a specific preimage sampling algorithm to the modified G + G signature, we obtain an efficient IBS scheme. In addition, we prove its security in the quantum random oracle model (QROM), following the paradigm introduced by Zhangdry (Crypto 2012). Finally, a complete specification of the IBS, featuring three distinct parameter sets, is accompanied by a proof-of-concept implementation. We believe that the combination of the preimage sampling with the Fiat–Shamir transformation holds potential for application in the other advanced digital signature schemes.

在这项工作中,我们探讨了与基于格的签名和预像采样相关的最新发展,并在理想格上指定了一个紧凑的基于身份的签名(IBS)以供实际使用。具体来说,我们首先提出了一个椭球版本的G + G签名方案(Asiacrypt 2023),该方案实现了略好的签名大小和更高的安全性。然后,通过对改进的G + G签名采用特定的预像采样算法,得到了一种高效的IBS方案。此外,我们遵循Zhangdry (Crypto 2012)引入的范式,在量子随机oracle模型(QROM)中证明了其安全性。最后,IBS的完整规范,具有三个不同的参数集,伴随着概念验证的实现。我们认为,将预像采样与Fiat-Shamir变换相结合在其他高级数字签名方案中具有应用潜力。
{"title":"Constructing Efficient Identity-Based Signatures on Lattices","authors":"Huiwen Jia,&nbsp;Ying Liu,&nbsp;Chunming Tang,&nbsp;Lin Wang","doi":"10.1049/ise2/6684889","DOIUrl":"10.1049/ise2/6684889","url":null,"abstract":"<p>In this work, we explore the recent developments related to lattice-based signature and preimage sampling, and specify a compact identity-based signature (IBS) on an ideal lattice for practical use. Specifically, we first propose an ellipsoid version of the G + G signature scheme (Asiacrypt 2023) that achieves slightly better signature size and higher security. Then, by adapting a specific preimage sampling algorithm to the modified G + G signature, we obtain an efficient IBS scheme. In addition, we prove its security in the quantum random oracle model (QROM), following the paradigm introduced by Zhangdry (Crypto 2012). Finally, a complete specification of the IBS, featuring three distinct parameter sets, is accompanied by a proof-of-concept implementation. We believe that the combination of the preimage sampling with the Fiat–Shamir transformation holds potential for application in the other advanced digital signature schemes.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/6684889","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145572310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1